-
漏洞信息

-
漏洞描述

HP-UX Trusted System contains unspecified flaws in telnetd and remshd that may allow a malicious user to obtain unauthorized remote access. The issue is triggered when telnetd is configured with TACACS authentication or remshd is enabled for use with rcp, rdist and remsh (rsh) commands. It is possible that the flaw may allow an attacker to bypass security restrictions resulting in a loss of confidentiality.

-
时间线

公开日期:
2005-05-26

发现日期:
Unknow

利用日期:Unknow

解决日期:Unknow

-
解决方案

Upgrade to versions listed in the vendor advisory or higher, as it has been reported to fix this vulnerability. For HP-UX B.11.22 the issue can be worked around by disabling remshd in /etc/inetd.conf and removing the telnet -t option. After making the changes to inetd.conf run "/usr/sbin/inetd -c" or reboot the system.

-
受影响的程序版本

-
漏洞讨论

HP-UX Trusted System is affected by an unspecified remote unauthorized access vulnerability. The specific details about this issue were not released therefore; the cause of this issue is currently unknown.

HP-UX B.11.00, B.11.11, B.11.22, B.11.23 systems that have been converted to Trusted Systems are affected by this issue.

This BID will be updated when more details are available.

-
漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.